• Volume 11,Issue 4,2000 Table of Contents
    Select All
    Display Type: |
    • A Formal Approach to Conformance Testing of Internet Routing Protocols

      2000, 11(4):427-434.

      Abstract (3533) HTML (0) PDF 473.32 K (4522) Comment (0) Favorites

      Abstract:Concurrent TTCN (tree and tabular combined notation) is a test notation that can handle concurrent test behaviors. This paper proposes an approach to the conformance testing of distributed routing protocols based on concurrent TTCN. It first discusses the test architecture for the routing protocol entity, and then the concurrent TTCN based test system design is presented. Finally, this paper introduces the test suite design.

    • A Model-Based Approach to Human Animation

      2000, 11(4):435-440.

      Abstract (3854) HTML (0) PDF 1.10 M (4647) Comment (0) Favorites

      Abstract:In this paper, starting from point-point and line-line correspondence, a detailed description of the calculation of projection parameters for 2D video features and 3D model features correspondence is presented firstly. Then a detailed description of the calculation of projection parameters for 2D human video features and 3D human model features correspondence is given. At the same time, an animation example of human walking is introduced which is produced by an animation system called Video&Animation Studio. The system is designed according to the above idea.

    • Branching Elements in Rwtt/M wtt

      2000, 11(4):441-452.

      Abstract (3949) HTML (0) PDF 352.04 K (4446) Comment (0) Favorites

      Abstract:It is proved that every element [c]∈R wtt /M wtt except the greatest and least elements is branching in R wtt /M wtt, i.e., the greatest lower bound of some two elements greater than [c], where R wtt /M wtt is the quotient of the r.e. wtt degrees wtt modulo the cappable r.e. wtt degrees M wtt.

    • Error Analysis in Nonlinear System Identification Using Fuzzy System

      2000, 11(4):447-452.

      Abstract (3539) HTML (0) PDF 322.83 K (4533) Comment (0) Favorites

      Abstract:In this paper, the numerical approximation characteristics of fuzzy system are discussed, and the influence of approximation error and initial state error on fuzzy system are analyzed. Finally, an important conclusion is obtained that under some conditions, fuzzy system output differs little from that of the actual system.

    • A Hybrid Multi-Concept Acquisition System

      2000, 11(4):453-460.

      Abstract (3819) HTML (0) PDF 458.45 K (4121) Comment (0) Favorites

      Abstract:In this paper, a hybrid multi-concept acquisition system HMCAS is proposed. HMCAS can perform incremental supervised learning on arbitrary sequences composed of analog or binary inputs. The kernel algorithm of HMCAS, named HMCAP, which integrates symbolic and neural learning based on the probability of instance space, has the ability of generating concept descriptions in the form of hybrid decision tree. The prototype system of HMCAS has been applied to the field of typhoon forecasting and achieved successful result.

    • >Review Articles
    • Distributed Virtual Environment: An Overview

      2000, 11(4):461-467.

      Abstract (7340) HTML (0) PDF 500.95 K (8350) Comment (0) Favorites

      Abstract:In DVE (distributed virtual environment), multiple users or environments located in different places connect to each other by network. Users can share information and perform interaction. Based on their studies, the authors give an overview of the research work done in the field of DVE in this paper, including its origin, requirements and features, model and architecture, typical systems and key techniques. Finally, some existing problems which need the further study and the further development of DVE are discussed.

    • Design and Implementation of a Network Management System Based on Web and Database

      2000, 11(4):468-472.

      Abstract (4232) HTML (0) PDF 375.48 K (6543) Comment (0) Favorites

      Abstract:A management model is proposed for the network management system based on Web and relational database in this paper. With this model, the components and implementation of a management system, Super-Domain, are described. Some key problems and their solutions, which include the storage model of management information, the maintenance of data consistency, the mechanism of real time alarming based on Web and the mechanism of system security, are also discussed.

    • Analysis and Improvement of Statistics-Based Chinese Part-of-Speech Tagging

      2000, 11(4):473-480.

      Abstract (4157) HTML (0) PDF 521.08 K (5731) Comment (0) Favorites

      Abstract:In this paper, a popular statistics-based training and tagging method for Chinese texts is studied, and the nonlinear relation between training set and tagging accuracy is analyzed from the aspects of the structure and numerical value of the matrix of transition probabilities and the matrix of symbol probabilities. In order to make use of training corpus sufficiently and get the higher tagging accuracy, the training and tagging method is improved from two aspects: using other grammatical attributes of words, and strengthening the processing of unknown words. With the improved method, open test and close test showed that the overall accuracies are about 96.5% and 96% respectively.

    • On Subtyping Inheritance and Inference Rules in Object-Oriented Z

      2000, 11(4):481-486.

      Abstract (3657) HTML (0) PDF 429.18 K (4574) Comment (0) Favorites

      Abstract:The inheritance relation of COOZ is discussed. It is divided into increasing inheritance and subtyping inheritance. The latter is studied and a behavioral subtyping inheritance is defined, by which the specification inheritance and its inference rules are defined. The soundness of the method is proved. The offered method is constructive compared with that of E. Cusack and is more flexible than that of Liskov et al.

    • Genetic Algorithm Based Fingerprint Matching Algorithm and Its Application in Automated Fingerprint Recognition System

      2000, 11(4):488-493.

      Abstract (3588) HTML (0) PDF 794.42 K (5009) Comment (0) Favorites

      Abstract:Automated fingerprint identification system (AFIS) has been studied widely because it s convenient, quick and exact in personal verification field. In this paper, a fingerprint minutia first matching method is proposed based on the structural features of minutia, and a genetic algorithm is applied to the further point matching phase. This method has given good results in automated fingerprint identification system (AFIS).

    • Ada-I: An Extension Language Supporting Inheritance of Protected Objects Based on Ada95

      2000, 11(4):494-501.

      Abstract (3677) HTML (0) PDF 484.54 K (4166) Comment (0) Favorites

      Abstract:Object-Oriented concurrent languages can help programmers to develop concurrent programs and to gain benefits by using object-oriented technology, such as encapsulation and inheritance. But inheritance anomaly influences designing object-oriented concurrent languages. Ada95 is one of the object-oriented languages that support concurrent program designing, but it does not support the inheritance of protected objects. Ada-I language based on Ada95 supports the inheritance of protected objects, and can avoid the inheritance anomaly.

    • A 3D Model Reconstruction Algorithm Based on the Texture of Photos

      2000, 11(4):502-506.

      Abstract (3783) HTML (0) PDF 527.74 K (4551) Comment (0) Favorites

      Abstract:In computer graphics, it's difficult to acquire realistic 3D scenes from the real world. In this paper, a novel 3D scene model reconstruction algorithm is presented to deal with this problem. This method reconstructs photo-realistic scene models according to the color and texture of basic input photos, which are distributed in the environment. This method can be used to reconstruct photo-realistic 3D model of complex real objects.

    • Transformation Methods for Communication Optimization on CC-NUMA Parallel System

      2000, 11(4):507-514.

      Abstract (3521) HTML (0) PDF 518.53 K (4505) Comment (0) Favorites

      Abstract:Reducing communication overhead is one of the goals of parallel compiling optimization. According to the characteristics of CC-NUMA parallel architecture, the authors propose some strategies and methods to optimize the communication of parallel programs by combining computing transformation and data transformation based on unified algebraic representation in this paper. Experimental results of optimization are presented, and the efficiency of the optimization policies and the methods is proved.

    • Study on IP Hijack

      2000, 11(4):515-519.

      Abstract (5121) HTML (0) PDF 339.99 K (4828) Comment (0) Favorites

      Abstract:There is a kind of active attack based on TCP over the Internet, which is called IP Hijack. This kind of attack is different from the passive attack based on network sniffing. It can bypass the protection of system password and S/KEY, and get full control of the link between two end points. This can cause great harm to the network system. In this paper, the principle of this kind of attack is analyzed, the attack detecting technology and the protecting measures against IP Hijack are also given.

    • Design and Implementation of a Driver Generator

      2000, 11(4):520-252.

      Abstract (3344) HTML (0) PDF 427.13 K (4589) Comment (0) Favorites

      Abstract:An SCSI (small computer system interface) driver automatic generator has been developed for developing SCSI drivers efficiently. The generator can automatically maintain SCSI subsystem code, generate most driver modules, package, and provide drivers under the master and slave running modes. In this paper, the authors present the automatic generator's design method, system control flow, data flow, system modules and hierarchy, interface and running processing. The paper describes in brief the system implementation, including the module management, automatic packaging, and model generation.

    • An Object-Oriented Open Hypermedia Engine

      2000, 11(4):526-531.

      Abstract (3667) HTML (0) PDF 771.13 K (4552) Comment (0) Favorites

      Abstract:The design principles and methods of the hypermedia engine are discussed in this paper, and an open hypermedia engine based on OODBMS (object-oriented database management systems) is presented. By introducing meta-object modeling, the engine can not only express complex hypermedia semantic, but also support the open hypermedia link protocol for integrating the third-part applications.

    • View Synthesis via Wavelet-Based Morphing

      2000, 11(4):532-539.

      Abstract (3782) HTML (0) PDF 1.77 M (4527) Comment (0) Favorites

      Abstract:This paper presents a new view synthesis technique using image morphing and 2-D discrete wavelet transform. The paper aims at pairwise images that are known without camera calibration and any other geometric information. Firstly, estimate the fundamental matrix related with any pair of images by techniques from stereovision. Using fundamental matrix, any pair of image planes can be rectified to be parallel and their corresponding points lie on the same scanline. Secondly, the paper describes an image morphing algorithm running in the wavelet domain. The proposed algorithm can synthesize new views more quickly. Any quantization techniques can be embedded here to compress the coefficients in depth. When displaying, compressed images are decoded and an inverse wavelet transform is achieved. Finally, a postwarping procedure is used to transform the interpolated views at desired position. Nice features of using wavelet transformation are its good locality in both space and frequency and its multiresolution representation mode, which makes the generated views be refined progressively and hence is suitable for communication. Also, the paper discusses the influences of different kinds of wavelet on the results.

    • COM/CORBA Interworking Based on Multi-Interface

      2000, 11(4):540-544.

      Abstract (3555) HTML (0) PDF 336.18 K (4797) Comment (0) Favorites

      Abstract:In the OMG's COM/CORBA interworking specification, interworking between COM and CORBA is implemented via bridges. Though the interworking model is flexible, it needs heavy overheads which leads to poor performance. Moreover, there are problems in its object life-cycle mapping. It does not provide portability either. In this paper, a COM/CORBA interworking model is proposed based on multi-interface object integration method. In the new model, a client can directly access a foreign object, therefore interworking performance is improved remarkably. In addition, it enhances interworking transparency and provides application portability between COM and CORBA environments.

    • Network Information Filtering Using Bookmark Service

      2000, 11(4):545-550.

      Abstract (3936) HTML (0) PDF 419.22 K (4382) Comment (0) Favorites

      Abstract:Information filtering is an important method to alleviate information overload. How to express user's information needs and how to rank them are two main problems in this area. This paper focuses on these two problems. Bookmark service, the solution that is an extension of bookmark function in browser, is used to catch user's information needs. The evaluation of the documents is used to represent user's information needs. Maxine Margin method, a novel ranking algorithm, is designed to increase precision. An experiment proves that it performs better than the traditional methods. A system called Bookmark Service System is designed for implementation. The system construction is given, and its main function is also introduced.

    • Load Sharing in Heterogeneous Computing

      2000, 11(4):551-556.

      Abstract (3635) HTML (0) PDF 380.35 K (4384) Comment (0) Favorites

      Abstract:In heterogeneous parallel computing systems based on message passing, every processor or computer has capability of scheduling and executing jobs autonomously and independently. For high performance computing, a processor, which originally has a divisible job, can call other heterogeneous processors for co computing with load sharing so that job completing time can be decreased. In this paper, a scheme for load sharing in heterogeneous computing is presented. Firstly, invoking load sharing protocol,the originating processor collects available data such as load sharing interval time and computing power from its partners.Secondly,a function is constructed which represents the relationshop between the total job magnitude and the job completion time.The function is essential for choosing a suite of appropriate processors,optimally partitionng and scheduling jobs,as well as minimizing the job completing time.Finally,an efficient algorithm is proposed through the examples in application and experiments.The algorithm is real-time at the moment when the job is just started,and can be extended to the situation of multiple jobs originated at multiple processors.

    • An Object-Extracting Approach Using Module Cohesion

      2000, 11(4):557-562.

      Abstract (4665) HTML (0) PDF 419.86 K (4609) Comment (0) Favorites

      Abstract:In this paper, an St (subprogram-type) graph is introduced to represent the relation between subprograms and types in programs. Several module cohesion metrics are discussed, and the effects of adding a subprogram to or deleting a subprogram from a module are analyzed based on module cohesion. An object-extracting algorithm is proposed.

    • A Fast Algorithm to Determine Whether the Intersection of Two Convex Regions Is Empty

      2000, 11(4):563-568.

      Abstract (4072) HTML (0) PDF 371.16 K (4788) Comment (0) Favorites

      Abstract:Collision detection algorithms play a very important role in the field of robot path planning. In a simulation system of intelligent robot, collision detection takes up a large portion of the time for the robot to plan a complete path from the initial position to the final position. So how to reduce the time the robot uses to detect collision becomes a key problem. But collision detection finally will transform to a problem to determine whether the intersection of two convex regions formed by linear inequalities is empty or not. The authors present a new algorithm in this paper. Firstly, a vector pointing from one polyhedron to the other is picked. Then the authors start to find an intersection plane of one polyhedron based on the scalar product of the norm vector of the plane and the picked vector. If such a plane is found, the intersection of the two convex polyhedra is not empty.

Current Issue


Volume , No.

Table of Contents

Archive

Volume

Issue

联系方式
  • 《Journal of Software 》
  • 主办单位:Institute of Software, CAS, China
  • 邮编:100190
  • 电话:010-62562563
  • 电子邮箱:jos@iscas.ac.cn
  • 网址:https://www.jos.org.cn
  • 刊号:ISSN 1000-9825
  •           CN 11-2560/TP
  • 国内定价:70元
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063